Understanding MTU (Maximum Transmission Unit) Link to heading
The MTU represents the largest size (in bytes) of a packet that can be transmitted over a network. Selecting an appropriate MTU size can significantly impact performance, especially in environments with varied network configurations and encapsulations.
Discovering MTU Using Ping and the “Don’t Fragment” Flag Link to heading
To discover the MTU between two networks, you can use the ping command with the “Don’t Fragment” flag. This allows you to test packet sizes and identify the largest size that does not result in fragmentation. Here are examples for Windows, Ubuntu, and macOS:
Windows Link to heading
- Open Command Prompt.
- Run the following command:
ping <destination> -f -l <size>
- Replace
<destination>
with the target IP or hostname. - Replace
<size>
with the packet size to test.
- Replace
- Adjust
<size>
downward if you receive the message: “Packet needs to be fragmented but DF set.”
Ubuntu Link to heading
- Open a terminal.
- Run the following command:
ping <destination> -M do -s <size>
- Replace
<destination>
with the target IP or hostname. - Replace
<size>
with the packet size minus 28 bytes (for ICMP headers).
- Replace
- Reduce
<size>
if the ping fails.
macOS Link to heading
- Open Terminal.
- Run the following command:
ping -D -s <size> <destination>
- Replace
<destination>
with the target IP or hostname. - Replace
<size>
with the packet size minus 28 bytes (for ICMP headers).
- Replace
- Lower
<size>
until you get a successful response.
Common MTUs with Encapsulation Link to heading
Below is a table of common MTU sizes for Ethernet and its variations:
Network Type | MTU (bytes) |
---|---|
Standard Ethernet | 1500 |
VLAN Tagging (802.1Q) | 1500 |
MPLS | 1500 |
PPPoE | 1492 |
GRE | 1476 |
IPSec (ESP over IPv4) | 1438-1446 |
IPv6 with IPSec | 1400-1420 |
Note that these values may vary depending on network configurations and encapsulations.
DHCP Option 26 Link to heading
DHCP Option 26 allows a DHCP server to specify the MTU size for clients. While useful, not all devices honor this setting, particularly in complex environments with mixed hardware and software.
- Devices that ignore Option 26 typically rely on default MTU values or manually configured settings.
- Administrators should test devices in their environment to ensure compliance and performance.
MSS Clamping and Path MTU Discovery Link to heading
MSS Clamping modifies the Maximum Segment Size (MSS) value in TCP headers to ensure that packets do not exceed the MTU. This is particularly useful when:
- Path MTU Discovery (PMTUD) fails due to improperly handled ICMP messages.
While MSS clamping is helpful, it is not a guaranteed solution. For instance:
- Routers or firewalls dropping ICMP “Fragmentation Needed” messages can disrupt PMTUD.
- Applications that do not rely on TCP may still experience fragmentation issues.
Recommendations Link to heading
- Use tools like ping to verify MTU between critical network points.
- Monitor devices for compliance with DHCP Option 26.
- Implement MSS clamping as a safeguard but test thoroughly to avoid relying solely on it.
By understanding these principles and testing configurations, network performance can be optimized for diverse environments without introducing avoidable errors or bottlenecks.